Home | Amazing | Today | Tags | Publishers | Years | Search 
IPv6 Network Administration
IPv6 Network Administration
This essential guide explains what works, what doesn't, and most of all, what's practical about IPv6--the next-generation Internet standard. A must-have for network administrators everywhere looking to fix their network's scalability and management problems. Also covers other IPv6 benefits, such as routing, integrated auto-configuration,...
Object-Oriented Thought Process, The, Second Edition
Object-Oriented Thought Process, The, Second Edition

The Object-Oriented Thought Process, Second Edition will lay the foundation in object-oriented concepts and then explain how various object technologies are used. Author Matt Weisfeld introduces object-oriented concepts, then covers abstraction, public and private classes, reusing code, and...

Switching to VoIP
Switching to VoIP

More and more businesses today have their receive phone service
through Internet instead of local phone company lines. Many
businesses are also using their internal local and wide-area
network infrastructure to replace legacy enterprise telephone
networks. This migration to a single network carrying voice
...

INSIDE 3DS MAX® 7
INSIDE 3DS MAX® 7
The world of 3D modeling and animation is a complex one. Lucky for you, with Inside 3ds max 7, you get not just one instructor but a team of expert developers and trainers who cover the newly revised program from every angle. Using case studies to uncover real-word solutions as well as hands-on tutorials to help you arrive at practical answers...
Programming Microsoft Office Access 2003 (Core Reference)
Programming Microsoft Office Access 2003 (Core Reference)

Whether you’re extending an existing database or developing a complex custom solution, get the code and instruction you need to exploit the power and performance of Access 2003. The newest edition o this acclaimed reference packs even more real-world examples and best practices for writing, testing, and debugging extensible database...

Hands-On Microsoft Access: A Practical Guide to Improving Your Access Skills
Hands-On Microsoft Access: A Practical Guide to Improving Your Access Skills

Go from Access "beginner" to Access "master"!

Millions of people use Microsoft Access, but only a small fraction of them are really comfortable with it. If you're ready to go "beyond the wizards"and become a confident, highly effective...

Practical Standards for Microsoft Visual Basic .NET
Practical Standards for Microsoft Visual Basic .NET

Microsoft Visual Basic has the largest user base of any development language in the world, and the ranks are growing. Estimates put the number of users of Visual Basic at about 3 million. Once considered a hobbyist's language, Visual Basic has quickly gained the respect of serious developers and is now widely used in...

The Definitive Guide to MySQL, Second Edition
The Definitive Guide to MySQL, Second Edition

Provides a thorough introduction to the installation, configuration, implementation, and administration of MySQL.

The Definitive Guide to MySQL, Second Edition, is the perfect all-in-one guide to MySQL. Whether you’re new to Web application development or you’re already an experienced...

Cisco 802.11 Wireless Networking Quick Reference
Cisco 802.11 Wireless Networking Quick Reference

A quick reference for network engineers and administrators, who are implementing or have implemented Cisco wireless technologies.

  • Find 802.11 WLAN information quickly and easily with this handy reference

  • Access product information fast...

UNIX® User's Handbook, Second Edition
UNIX® User's Handbook, Second Edition

UNIX end-users desperately need an up-to-date reference guide with real depth: one that teaches UNIX commands and doesn't just list them! In UNIX User's Handbook, second edition, best-selling UNIX author Marty Poniatowski covers every topic UNIX users need to master-with exceptional clarity...

Network Security Architectures
Network Security Architectures

Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. Whether your background is security or networking, you can use this book to learn how to...

Snort Cookbook
Snort Cookbook
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an...
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy